A new strain of malware aimed at Linux-based SSH servers is actively trying to avoid infecting government or military systems. Read More ▶ |
|
| eBook: Lookout Get the eBook "How to Buy an Enterprise Mobile Security Solution" to assist you throughout the process of managing a mobile security initiative, including guidance for every phase of a mobile security project from evaluating solutions to deployment. Read More ▶ | An image shared with local media during the early stages of a SamSam ransomware infection in Atlanta exposed the contact portal assigned to the city by the group responsible for the attack. When questioned about their actions via the exposed portal, the SamSam group later deleted the contact form, calling the questions and comments spam. Read More ▶ |
| The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More ▶ |
| Most businesses would prefer to bury the costs associated with their response to a data security event. That's not always an option. Read More ▶ |
| | The Intellicta Platform from TechDemocracy acts like a security information and event management (SIEM) console, but for compliancy issues. It pulls information from a series of network collectors and correlates that data into a continuously-monitored compliancy dashboard. Read More ▶ |
| An extreme approach to protecting privacy can actually make personal data less safe. Don’t overreact. Read More ▶ |
| Want a more effective IT security strategy? Dispel your CEO and senior management of these common cybersecurity misconceptions. Read More ▶ |
| Research/Infographic: Lookout Your organization's sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a look at the Mobile Risk Matrix in this infographic now. Read More ▶ | CSO Insider | Editor's Picks |
|
|
|